{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T05:09:16Z","timestamp":1769836156765,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":42,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,3,16]],"date-time":"2020-03-16T00:00:00Z","timestamp":1584316800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Science Foundation (NSF) SaTC","award":["CNS-1330553"],"award-info":[{"award-number":["CNS-1330553"]}]},{"name":"National Science Foundation (NSF) SaTC","award":["CNS-1330599"],"award-info":[{"award-number":["CNS-1330599"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,3,16]]},"DOI":"10.1145\/3374664.3375745","type":"proceedings-article","created":{"date-parts":[[2020,3,13]],"date-time":"2020-03-13T17:06:53Z","timestamp":1584119213000},"page":"235-246","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["n-m-Variant Systems"],"prefix":"10.1145","author":[{"given":"Isaac","family":"Polinsky","sequence":"first","affiliation":[{"name":"North Carolina State University, Raleigh, NC, USA"}]},{"given":"Kyle","family":"Martin","sequence":"additional","affiliation":[{"name":"North Carolina State University, Raleigh, NC, USA"}]},{"given":"William","family":"Enck","sequence":"additional","affiliation":[{"name":"North Carolina State University, Raleigh, NC, USA"}]},{"given":"Michael K.","family":"Reiter","sequence":"additional","affiliation":[{"name":"University of North Carolina at Chapel Hill, Chapel Hill, NC, USA"}]}],"member":"320","published-online":{"date-parts":[[2020,3,16]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Prime: Byzantine replication under attack","author":"Amir Yair","year":"2010","unstructured":"Yair Amir, Brian Coan, Jonathan Kirsch, and John Lane. 2010a. Prime: Byzantine replication under attack. IEEE transactions on dependable and secure computing (Dec. 2010)."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2008.53"},{"key":"e_1_3_2_1_3_1","volume-title":"2011 5th Latin-American Symposium on Dependable Computing. 35--44","author":"Lu\u00ecs T. A.","unstructured":"Lu\u00ecs T. A. N. Brand ao and Alysson Bessani. 2011. On the Reliability and Availability of Systems Tolerant to Stealth Intrusion. In 2011 5th Latin-American Symposium on Dependable Computing. 35--44."},{"key":"e_1_3_2_1_4_1","volume-title":"Optimal Design of Large Software-Systems Using N-Version Programming.","volume":"43","author":"Ashrafi N.","year":"1994","unstructured":"N. Ashrafi, O. Berman, and M. Cutler. 1994. Optimal Design of Large Software-Systems Using N-Version Programming. , Vol. 43, 2 (June 1994), 344--350."},{"key":"e_1_3_2_1_5_1","article-title":"The N-Version Approach to Fault-Tolerant Software","volume":"11","author":"Avizienis A.","year":"1985","unstructured":"A. Avizienis. 1985. The N-Version Approach to Fault-Tolerant Software. IEEE Transactions on Software Engineering , Vol. 11 (Dec. 1985), 1491--1501.","journal-title":"IEEE Transactions on Software Engineering"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/357830.357849"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539795288490"},{"key":"e_1_3_2_1_8_1","volume-title":"Network-Attack-Resilient Intrusion-Tolerant SCADA for the Power Grid. In 2018 48th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN) . 255--266","author":"Babay Amy","year":"2018","unstructured":"Amy Babay, Thomas Tantillo, Trevor Aron, Marco Platania, and Yair Amir. 2018. Network-Attack-Resilient Intrusion-Tolerant SCADA for the Power Grid. In 2018 48th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN) . 255--266."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"A. Benameur N. S. Evans and M. C. Elder. 2013. Cloud resiliency and security via diversified replica execution and monitoring. In 6textsuperscriptth International Symposium on Resilient Control Systems .","DOI":"10.1109\/ISRCS.2013.6623768"},{"key":"e_1_3_2_1_10_1","volume-title":"Proceedings of the 27th ACM SIGPLAN Conference on Programming Language Design and Implementation , 158--168","author":"Emery","unstructured":"Emery D. Berger and Benjamin G. Zorn. 2006. DieHard: Probabilistic Memory Safety for Unsafe Languages. Proceedings of the 27th ACM SIGPLAN Conference on Programming Language Design and Implementation , 158--168."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"D. Bruschi L. Cavallaro and A. Lanzi. 2007. Diversified Process Replicas for Defeating Memory Error Exploits. In 3textsuperscriptrd IEEE International Workshop Information Assurance. 434--441.","DOI":"10.1109\/PCCC.2007.358924"},{"key":"e_1_3_2_1_12_1","volume-title":"Proceedings of the third symposium on Operating systems design and implementation (OSDI)","volume":"99","author":"Castro Miguel","year":"1999","unstructured":"Miguel Castro and Barbara Liskov. 1999. Practical Byzantine fault tolerance. In Proceedings of the third symposium on Operating systems design and implementation (OSDI), Vol. 99. 173--186."},{"key":"e_1_3_2_1_13_1","unstructured":"L. Chen and A. Avizienis. 1978. N-version programming: A Fault Tolerance Approach to Reliability of Software Operation. In 8textsuperscriptth International Conference on Fault-Tolerant Computing. 3--9."},{"key":"e_1_3_2_1_14_1","volume-title":"Diverse Replication for Single-Machine Byzantine-Fault Tolerance. In USENIX Annual Technical Conference. 287--292","author":"Chun B.-G.","unstructured":"B.-G. Chun, P. Maniatis, and S. Shenker. 2008. Diverse Replication for Single-Machine Byzantine-Fault Tolerance. In USENIX Annual Technical Conference. 287--292."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/0012-365X(79)90084-0"},{"key":"e_1_3_2_1_16_1","volume-title":"USENIX Security Symposium .","author":"Cox B.","unstructured":"B. Cox, D. Evans, A. Filipi, J. Rowanhill, W. Hu, J. Davidson, J. Knight, A. Nguyen-Tuong, and J. Hiser. 2006. N-Variant Systems -- A Secretless Framework for Security through Diversity. In USENIX Security Symposium ."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.52"},{"key":"e_1_3_2_1_18_1","unstructured":"Firecracker. 2018. . https:\/\/github.com\/firecracker-microvm\/firecracker"},{"key":"e_1_3_2_1_19_1","unstructured":"FireEye. 2018. M-Trends 2018: The Trends Behind Today's Breaches and Cyber Attacks. https:\/\/www.fireeye.com\/content\/dam\/collateral\/en\/mtrends-2018.pdf"},{"key":"e_1_3_2_1_20_1","unstructured":"Lukas Fittl. 2018. libpg_query. https:\/\/github.com\/lfittl\/libpg_query"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2008.39"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2433252"},{"key":"e_1_3_2_1_23_1","volume-title":"Unbelievable: An Efficient N-version Execution Framework. In 20textsuperscriptth International Conference on Architectural Support for Programming Languages and Operating Systems .","author":"Hosek P.","year":"2015","unstructured":"P. Hosek and C. Cadar. 2015. VARAN the Unbelievable: An Efficient N-version Execution Framework. In 20textsuperscriptth International Conference on Architectural Support for Programming Languages and Operating Systems ."},{"key":"e_1_3_2_1_24_1","volume-title":"Software Rejuvenation: Analysis, Module and Application. In 25textsuperscriptth International Symposium on Fault Tolerant Computing . 381--390.","author":"Huang Y.","year":"1995","unstructured":"Y. Huang, D. Arsenault, and A. Sood. 1995. Software Rejuvenation: Analysis, Module and Application. In 25textsuperscriptth International Symposium on Fault Tolerant Computing . 381--390."},{"key":"e_1_3_2_1_25_1","volume-title":"The Byzantine Generals Problem. ACM Transactions on Programming Languages and Systems (July","author":"Lamport Leslie","year":"1982","unstructured":"Leslie Lamport, Robert Shostak, and Marshall Pease. 1982. The Byzantine Generals Problem. ACM Transactions on Programming Languages and Systems (July 1982), 382--401."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"crossref","unstructured":"F. Machida D. Kim and K. S. Trivedi. 2010. Modeling and Analysis of Software Rejuvenation in a Server Virtualized System. In 2textsuperscriptnd International Workshop on Software Aging and Rejuvenation .","DOI":"10.1109\/WOSAR.2010.5722098"},{"key":"e_1_3_2_1_27_1","unstructured":"J. Reynolds J. Just E. Lawson L. Clough and R. Maglich. 2002. The Design and Implementation of an Intrusion Tolerant System. In 32textsuperscriptnd IEEE\/IFIP International Conference on Dependable Systems and Networks . 258--290."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"crossref","unstructured":"A. Rezaei and M. Sharifi. 2010. Rejuvenating High Available Virtualized Systems. In 5textsuperscriptth International Conference on Availability Reliability and Security .","DOI":"10.1109\/ARES.2010.69"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/502034.502037"},{"key":"e_1_3_2_1_30_1","volume-title":"In Workshop on Compiler and Architectural Techniques for Application Reliability and Security .","author":"Salamat Babak","year":"2008","unstructured":"Babak Salamat, Andreas Gal, and Michael Franz. 2008. Reverse stack execution in a multi-variant execution environment. In In Workshop on Compiler and Architectural Techniques for Application Reliability and Security ."},{"key":"e_1_3_2_1_31_1","volume-title":"Orchestra: Intrusion Detection Using Parallel Execution and Monitoring of Program Variants in User-Space. In 4textsuperscriptth ACM European Conference on Computer Systems. 33--46.","author":"Salamat B.","year":"2009","unstructured":"B. Salamat, T. Jackson, A. Gal, and M. Franz. 2009. Orchestra: Intrusion Detection Using Parallel Execution and Monitoring of Program Variants in User-Space. In 4textsuperscriptth ACM European Conference on Computer Systems. 33--46."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2011.18"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2009.83"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"crossref","unstructured":"T. Thein S. Chi and J. S. Park. 2008. Improving Fault Tolerance by Virtualization and Software Rejuvenation. In 2textsuperscriptnd Asia International Conference on Modeling & Simulation .","DOI":"10.1109\/AMS.2008.75"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2009.02.019"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3064176.3064178"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2411254"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.5555\/3026959.3026976"},{"key":"e_1_3_2_1_39_1","volume-title":"GHUMVEE: Efficient, Effective, and Flexible Replication. In 5textsuperscriptth International Conference on Foundations and Practice of Security .","author":"Volckaert S.","year":"2012","unstructured":"S. Volckaert, B. De Sutter, T. De Baets, and K. De Bosschere. 2012. GHUMVEE: Efficient, Effective, and Flexible Replication. In 5textsuperscriptth International Conference on Foundations and Practice of Security ."},{"key":"e_1_3_2_1_40_1","unstructured":"E. Weatherwax J. Knight and A. Nguyen-Tuong. 2009. A model of secretless security in N-variant systems. In 39textsuperscriptth IEEE\/IFIP International Conference on Dependable Systems Networks ."},{"key":"e_1_3_2_1_41_1","volume-title":"Proceedings of the 27th USENIX Conference on Security Symposium. 1199--1211","author":"Webster Ashton","year":"2018","unstructured":"Ashton Webster, Ryan Eckenrod, and James Purtilo. 2018. Fast and Service-preserving Recovery from Malware Infections Using CRIU. In Proceedings of the 27th USENIX Conference on Security Symposium. 1199--1211."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"crossref","unstructured":"K. Xu D. Yao B. Ryder and K. Tian. 2015. Probabilistic Program Modeling for High-Precision Anomaly Classification. In 28textsuperscriptth IEEE Computer Security Foundations Symposium .","DOI":"10.1109\/CSF.2015.37"}],"event":{"name":"CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy","location":"New Orleans LA USA","acronym":"CODASPY '20","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the Tenth ACM Conference on Data and Application Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3374664.3375745","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3374664.3375745","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:33:08Z","timestamp":1750199588000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3374664.3375745"}},"subtitle":["Adversarial-Resistant Software Rejuvenation for Cloud-Based Web Applications"],"short-title":[],"issued":{"date-parts":[[2020,3,16]]},"references-count":42,"alternative-id":["10.1145\/3374664.3375745","10.1145\/3374664"],"URL":"https:\/\/doi.org\/10.1145\/3374664.3375745","relation":{},"subject":[],"published":{"date-parts":[[2020,3,16]]},"assertion":[{"value":"2020-03-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}